Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 04:53

General

  • Target

    93d97c7037414c4e44cfedb7a7a46460N.exe

  • Size

    2.7MB

  • MD5

    93d97c7037414c4e44cfedb7a7a46460

  • SHA1

    04721c94dc8f6c523a81ff86c3e8dfad45c510df

  • SHA256

    d24b94b8442e2ab556693a6de5bbf1ad0d4799985ebdbcb8e61832616e2eb929

  • SHA512

    a49ab73714351630514509c8baa725a142f5a28df063933beb63d9f20f3a3f5524548549d4f6c23de6446956b61d05b8811ada2d87d3b5e3c2f060c4aa56d73f

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB99w4S+:+R0pI/IQlUoMPdmpSpJ4X

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93d97c7037414c4e44cfedb7a7a46460N.exe
    "C:\Users\Admin\AppData\Local\Temp\93d97c7037414c4e44cfedb7a7a46460N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\SysDrvXM\xbodsys.exe
      C:\SysDrvXM\xbodsys.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LabZIL\optiasys.exe

    Filesize

    2.7MB

    MD5

    3c53644efbee1bc1bad283505e2067db

    SHA1

    1de3f877795a5ad0c7cec218fb5882788bab56e6

    SHA256

    0848521ecbc350b69b251dd4c8a8b68c948bb13db10b1f86fe3037a83f2d9347

    SHA512

    15e8b4e1747bcd7e44df91e0f6c886273371bb34751a82722790bb1b0053cf6cbf1a244ecff10762a98d505e93d1045ec974054cedcedfef0a9c0112a832b697

  • C:\SysDrvXM\xbodsys.exe

    Filesize

    2.7MB

    MD5

    6ccf209579aa4f552b8620c57a31464a

    SHA1

    3cb8e731aff3dfe2b46104fd0a41a28f7283d8dd

    SHA256

    1fdcf75eeee56d5edbc44f194c0e52c3c62d39119a7b83473904d61d6f2b239a

    SHA512

    2a001c3ed27113b21fb169a90d2f675dd1f2832c28b30572e39aa7252112208eb7cb41e0d0b28a88a87ba5050f4e03a38edd3600324857be771acb09c34cdfc9

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    204B

    MD5

    d9c5339d7c8f3495e415cba9d2b5cd8f

    SHA1

    1bc7ee74005b64eb1a72f841708751c17d5238e3

    SHA256

    434705a1629df55782e8af139908c2e3b2270fe7a42fd27c217842ade84240c9

    SHA512

    6a440330e5b8207d7004817612879a47c165b7ced0b4ad767b93668a6e7a49b47a8d7ea5bdd343ad89570c5898d412187355c3dbdeca0ba220cb9fb696bc1913